Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud,
where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019.
Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team. Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and ""PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance"" (book website) and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and other books. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, security management. His blog "Security Warrior" was one of the most popular in the industry. In addition, Anton teaches classes and presents at many security conferences across the world; he addressed audiences in United States, UK, Australia, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on advisory boards of several security start-ups. Before that, Anton was running his own security consulting practice, focusing on logging, SIEM and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University. |
|||
Areas of Interest
|
|||
Education
|
|||
|
|||
Publications
and Presentations
"Implementing and Running
SIEM: Approaches and Lessons"
"PCI DSS Myths 2010: Why Are They STILL Alive" "LogChaos: Challenges and Opportunities of Security Log Standardization" "Logs vs Insiders: Log Data as a Weapon of Choice Against Insider Attacks" "What Every Organization Should Monitor and Log" "Simple Log Mining" "Log Forensics" "Seven Mistakes of Security Log Management" Full list of security presentations. All my presentations on Slideshare.
"Five mistakes of vulnerability management"
Full list of security publications All my publication on DocStoc.
A.
Chuvakin and J.Smith, "Evolution program for
parton densities with perturbative heavy flavor boundary conditions",
Comput.Phys.Commun. 143 (2002) 257-286
Full list of physics publications |
|||
Membership
|
|||
Contact Information
|
|||
Pictures | |||
Links |